3.3 KiB
title, description, ms.prod, ms.topic, ms.date
title | description | ms.prod | ms.topic | ms.date |
---|---|---|---|---|
Configure the Rules to Require Encryption | Learn how to configure rules to add encryption algorithms and delete the algorithm combinations that don't use encryption for zones that require encryption. | windows-client | conceptual | 09/07/2021 |
Configure the Rules to Require Encryption
If you're creating a zone that requires encryption, you must configure the rules to add the encryption algorithms and delete the algorithm combinations that don't use encryption.
Administrative credentials
To complete this procedure, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the GPOs.
To modify an authentication request rule to also require encryption
-
Open the Group Policy Management Console to Windows Defender Firewall with Advanced Security.
-
In the navigation pane, click Connection Security Rules.
-
In the details pane, double-click the connection security rule you want to modify.
-
On the Name page, rename the connection security rule, edit the description to reflect the new use for the rule, and then click OK.
-
In the navigation pane, right-click Windows Defender Firewall – LDAP://CN={guid}, and then click Properties.
-
Click the IPsec Settings tab.
-
Under IPsec defaults, click Customize.
-
Under Data protection (Quick Mode), click Advanced, and then click Customize.
-
Click Require encryption for all connection security rules that use these settings.
This setting disables the data integrity rules section. Ensure the Data integrity and encryption list contains all of the combinations that your client devices will use to connect to members of the encryption zone. The client devices receive their rules through the GPO for the zone to which they reside. You must make sure that those rules contain at least one of the data integrity and encryption algorithms that are configured in this rule, or the client devices in that zone won't be able to connect to devices in this zone.
-
If you need to add an algorithm combination, click Add and then select the combination of encryption and integrity algorithms. The options are described in Configure Data Protection (Quick Mode) Settings.
Note Not all of the algorithms available in Windows 8 or Windows Server 2012 and later can be selected in the Windows Defender Firewall with Advanced Security user interface. To select them, you can use Windows PowerShell.
Quick mode settings can also be configured on a per-rule basis, but not by using the Windows Defender Firewall user interface. Instead, you can create or modify the rules by using Windows PowerShell.
For more info, see Windows Defender Firewall with Advanced Security Administration with Windows PowerShell
-
During negotiation, algorithm combinations are proposed in the order shown in the list. Ensure that the more secure combinations are at the top of the list so that the negotiating devices select the most secure combination that they can jointly support.
-
Click OK three times to save your changes.